CVE-2023-2728: Kubernetes mountable secrets policy bypass
(updated )
Users may be able to launch containers that bypass the mountable secrets policy enforced by the ServiceAccount admission plugin when using ephemeral containers. The policy ensures pods running with a service account may only reference secrets specified in the service account’s secrets field. Kubernetes clusters are only affected if the ServiceAccount admission plugin and the kubernetes.io/enforce-mountable-secrets
annotation are used together with ephemeral containers.
References
- www.openwall.com/lists/oss-security/2023/07/06/3
- github.com/advisories/GHSA-cgcv-5272-97pr
- github.com/kubernetes/kubernetes/issues/118640
- github.com/kubernetes/kubernetes/pull/118356
- github.com/kubernetes/kubernetes/pull/118471
- github.com/kubernetes/kubernetes/pull/118473
- github.com/kubernetes/kubernetes/pull/118474
- github.com/kubernetes/kubernetes/pull/118512
- groups.google.com/g/kubernetes-security-announce/c/vPWYJ_L84m8
- nvd.nist.gov/vuln/detail/CVE-2023-2728
Detect and mitigate CVE-2023-2728 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →